You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Composer is an open source dependency manager for the PHP language. In affected versions windows users running Composer to install untrusted dependencies are subject to command injection and should upgrade their composer version. Other OSs and WSL are not affected. The issue has been resolved in composer versions 1.10.23 and 2.1.9. There are no workarounds for this issue.
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
mend-for-github-combot
changed the title
CVE-2021-41116 (Critical) detected in composer/composer-1.10.22
CVE-2021-41116 (Critical) detected in composer/composer-1.10.22 - autoclosed
May 5, 2024
CVE-2021-41116 - Critical Severity Vulnerability
Vulnerable Library - composer/composer-1.10.22
Composer helps you declare, manage and install dependencies of PHP projects. It ensures you have the right stack everywhere.
Library home page: https://api.github.com/repos/composer/composer/zipball/28c9dfbe2351635961f670773e8d7b17bc5eda25
Dependency Hierarchy:
Found in HEAD commit: ba8cd9078c8ce0cb202767d627706711237abf71
Found in base branch: main
Vulnerability Details
Composer is an open source dependency manager for the PHP language. In affected versions windows users running Composer to install untrusted dependencies are subject to command injection and should upgrade their composer version. Other OSs and WSL are not affected. The issue has been resolved in composer versions 1.10.23 and 2.1.9. There are no workarounds for this issue.
Publish Date: 2021-10-05
URL: CVE-2021-41116
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-frqg-7g38-6gcf
Release Date: 2021-10-05
Fix Resolution: 1.10.23, 2.1.9
The text was updated successfully, but these errors were encountered: